KnownTechniques enum

Known values of Techniques that the service accepts.

Fields

AbuseElevationControlMechanism

AbuseElevationControlMechanism

AccessTokenManipulation

AccessTokenManipulation

AccountDiscovery

AccountDiscovery

AccountManipulation

AccountManipulation

ActiveScanning

ActiveScanning

ApplicationLayerProtocol

ApplicationLayerProtocol

AudioCapture

AudioCapture

BootOrLogonAutostartExecution

BootOrLogonAutostartExecution

BootOrLogonInitializationScripts

BootOrLogonInitializationScripts

BruteForce

BruteForce

CloudInfrastructureDiscovery

CloudInfrastructureDiscovery

CloudServiceDashboard

CloudServiceDashboard

CloudServiceDiscovery

CloudServiceDiscovery

CommandAndScriptingInterpreter

CommandAndScriptingInterpreter

CompromiseClientSoftwareBinary

CompromiseClientSoftwareBinary

CompromiseInfrastructure

CompromiseInfrastructure

ContainerAndResourceDiscovery

ContainerAndResourceDiscovery

CreateAccount

CreateAccount

CreateOrModifySystemProcess

CreateOrModifySystemProcess

CredentialsFromPasswordStores

CredentialsFromPasswordStores

DataDestruction

DataDestruction

DataEncryptedForImpact

DataEncryptedForImpact

DataFromCloudStorageObject

DataFromCloudStorageObject

DataFromConfigurationRepository

DataFromConfigurationRepository

DataFromInformationRepositories

DataFromInformationRepositories

DataFromLocalSystem

DataFromLocalSystem

DataManipulation

DataManipulation

DataStaged

DataStaged

Defacement

Defacement

DeobfuscateDecodeFilesOrInformation

DeobfuscateDecodeFilesOrInformation

DiskWipe

DiskWipe

DomainTrustDiscovery

DomainTrustDiscovery

DriveByCompromise

DriveByCompromise

DynamicResolution

DynamicResolution

EndpointDenialOfService

EndpointDenialOfService

EventTriggeredExecution

EventTriggeredExecution

ExfiltrationOverAlternativeProtocol

ExfiltrationOverAlternativeProtocol

ExploitationForClientExecution

ExploitationForClientExecution

ExploitationForCredentialAccess

ExploitationForCredentialAccess

ExploitationForDefenseEvasion

ExploitationForDefenseEvasion

ExploitationForPrivilegeEscalation

ExploitationForPrivilegeEscalation

ExploitationOfRemoteServices

ExploitationOfRemoteServices

ExploitPublicFacingApplication

ExploitPublicFacingApplication

ExternalRemoteServices

ExternalRemoteServices

FallbackChannels

FallbackChannels

FileAndDirectoryDiscovery

FileAndDirectoryDiscovery

FileAndDirectoryPermissionsModification

FileAndDirectoryPermissionsModification

GatherVictimNetworkInformation

GatherVictimNetworkInformation

HideArtifacts

HideArtifacts

HijackExecutionFlow

HijackExecutionFlow

ImpairDefenses

ImpairDefenses

ImplantContainerImage

ImplantContainerImage

IndicatorRemovalOnHost

IndicatorRemovalOnHost

IndirectCommandExecution

IndirectCommandExecution

IngressToolTransfer

IngressToolTransfer

InputCapture

InputCapture

InterProcessCommunication

InterProcessCommunication

LateralToolTransfer

LateralToolTransfer

ManInTheMiddle

ManInTheMiddle

Masquerading

Masquerading

ModifyAuthenticationProcess

ModifyAuthenticationProcess

ModifyRegistry

ModifyRegistry

NetworkDenialOfService

NetworkDenialOfService

NetworkServiceScanning

NetworkServiceScanning

NetworkSniffing

NetworkSniffing

NonApplicationLayerProtocol

NonApplicationLayerProtocol

NonStandardPort

NonStandardPort

ObfuscatedFilesOrInformation

ObfuscatedFilesOrInformation

ObtainCapabilities

ObtainCapabilities

OfficeApplicationStartup

OfficeApplicationStartup

OSCredentialDumping

OSCredentialDumping

PermissionGroupsDiscovery

PermissionGroupsDiscovery

Phishing

Phishing

PreOSBoot

PreOSBoot

ProcessDiscovery

ProcessDiscovery

ProcessInjection

ProcessInjection

ProtocolTunneling

ProtocolTunneling

Proxy

Proxy

QueryRegistry

QueryRegistry

RemoteAccessSoftware

RemoteAccessSoftware

RemoteServices

RemoteServices

RemoteServiceSessionHijacking

RemoteServiceSessionHijacking

RemoteSystemDiscovery

RemoteSystemDiscovery

ResourceHijacking

ResourceHijacking

ScheduledTaskJob

ScheduledTaskJob

ScreenCapture

ScreenCapture

SearchVictimOwnedWebsites

SearchVictimOwnedWebsites

ServerSoftwareComponent

ServerSoftwareComponent

ServiceStop

ServiceStop

SignedBinaryProxyExecution

SignedBinaryProxyExecution

SoftwareDeploymentTools

SoftwareDeploymentTools

SQLStoredProcedures

SQLStoredProcedures

StealOrForgeKerberosTickets

StealOrForgeKerberosTickets

SubvertTrustControls

SubvertTrustControls

SupplyChainCompromise

SupplyChainCompromise

SystemInformationDiscovery

SystemInformationDiscovery

TaintSharedContent

TaintSharedContent

TrafficSignaling

TrafficSignaling

TransferDataToCloudAccount

TransferDataToCloudAccount

TrustedRelationship

TrustedRelationship

UnsecuredCredentials

UnsecuredCredentials

UserExecution

UserExecution

ValidAccounts

ValidAccounts

WindowsManagementInstrumentation

WindowsManagementInstrumentation